9 Essential Q&As on Network Management

  1. What are the types of alarm logs?

    • Active: alarms that are still present
    • Historical: alarms that were raised and have since been cleared
  2. How does performance monitoring work?

    • Data collection at 15-minute intervals
    • Data collection at 24-hour intervals
  3. What is alarm suppression?

    • A feature in the NMS that silences or hides certain alarms to prevent repetitive notifications
  4. What does “inventory” include?

    • A list of all hardware details: chassis, cards, slots, board specifics, serial and part numbers, operational dates, manufacturing dates, etc.
  5. What are the alarm severity levels?

    • Critical
    • Major
    • Minor
    • Warning
  6. How can you log in to network elements?

    • Via the web GUI
    • Via the CLI
    • Through the NMS
  7. What common database operations are performed?

    • Backup
    • Restore
  8. What types of logs are commonly used for troubleshooting?

    • Debug log
    • Syslog
    • Performance log
    • Alarm log
    • Event log
  9. How does the NMS handle performance and event logs?

    • It stores metrics and events for both historical analysis and real-time monitoring.

LinkedIn: :point_down: